BugId OOBW[4n]-4n~4n ed2.531 @ tests_x64.exe!wmain summary

BugId: OOBW[4n]-4n~4n ed2.531
Location: tests_x64.exe!wmain
Source: p:\dev\cbugid\tests\src\_tmain.cpp @ 485
Description: Heap corruption detected at 0x14622B40FFC; 4 bytes before a 16777216/0x1000000 bytes heap block at 0x14622B41000.
Version: tests_x64.exe: Wed May 10 23:51:46 2017 (59138B72) (x64)
Security impact: Potentially exploitable security issue, if the corruption is attacker controlled.
Integrity level: 0x2000 (Medium Integrity; this process appears to not be sandboxed!)
Arguments: ['OutOfBounds', 'Heap', 'Write', '0x1000000', '-4', '4']

BugId version 2017-11-01 14:17. You may not use this version of BugId for commercial purposes. Please contact the author if you wish to use BugId commercially. Contact and licensing information can be found at the bottom of this report.

Stack

  1. verifier.dll!VerifierStopMessage + 0x273 (this frame is irrelevant to this bug)
  2. verifier.dll!AVrfpDphReportCorruptedBlock + 0x2A7 (this frame is irrelevant to this bug)
  3. verifier.dll!AVrfpDphCheckNormalHeapBlock + 0xC4 (this frame is irrelevant to this bug)
  4. verifier.dll!AVrfpDphNormalHeapFree + 0x27 (this frame is irrelevant to this bug)
  5. verifier.dll!AVrfDebugPageHeapFree + 0xAF (this frame is irrelevant to this bug)
  6. ntdll.dll!RtlDebugFreeHeap + 0x3C05B (this frame is irrelevant to this bug)
  7. ntdll.dll!RtlpFreeHeap + 0x7EAB3 (this frame is irrelevant to this bug)
  8. ntdll.dll!RtlFreeHeap + 0x846 (this frame is irrelevant to this bug)
  9. tests_x64.exe!wmain + 0x19B0 (id: ed2) [[p:\dev\cbugid\tests\src\_tmain.cpp @ 485]]
  10. tests_x64.exe!invoke_main + 0x22 (inlined function, id: 531)
  11. tests_x64.exe!__scrt_common_main_seh + 0x11D [[f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 253]]
  12. kernel32.dll!BaseThreadInitThunk + 0x14
  13. ntdll.dll!RtlUserThreadStart + 0x21
⇓ click on the title of a section to open or close it.